US 11,750,657 B2
Cyber digital twin simulator for security controls requirements
Eitan Hadar, Nesher (IL); Alexander Basovskiy, Hod Ha'sharon (IL); Dmitry Kravchenko, Kefar Sava (IL); and Dan Klein, Rosh Ha'ayin (IL)
Assigned to Accenture Global Solutions Limited, Dublin (IE)
Filed by Accenture Global Solutions Limited, Dublin (IE)
Filed on Feb. 26, 2021, as Appl. No. 17/186,235.
Claims priority of provisional application 62/983,040, filed on Feb. 28, 2020.
Prior Publication US 2021/0273978 A1, Sep. 2, 2021
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/20 (2013.01) 21 Claims
OG exemplary drawing
 
1. A computer-implemented method for mitigating cyber security risk of an enterprise network, the computer-implemented method comprising:
receiving an analytical attack graph (AAG) representing paths within the enterprise network with respect to at least one target asset, the AAG at least partially defining a digital twin of the enterprise network and comprising a set of rule nodes, each rule node representing an attack tactic that can be used to move along a path;
determining a set of security controls, each security control mitigating at least one rule node in at least a sub-set of rule nodes of the set of rule nodes;
executing a first iteration of a simulation representing implementation of a first sub-set of security controls in the enterprise network, the first iteration comprising:
for each security control in the set of security controls, determining, a first influence score that represents a change in a security risk that would result from implementing the security control and a rule distribution representing one or more rules that the security control mitigates,
defining the first sub-set of security controls based on the first influence scores, and
reducing the AAG based on the first sub-set of security controls and a first reduction method to provide a first residual AAG, the first reduction method being automatically selected based on a curve representative of an influence score histogram for the set of security controls;
determining a decrease in a graph risk value based on the AAG and the first residual AAG; and
selectively implementing the first sub-set of security controls in the enterprise network at least partially in response to the decrease in the graph risk value.